Message ID | 1493749661-22686-1-git-send-email-geert@linux-m68k.org (mailing list archive) |
---|---|
State | New, archived |
Headers | show |
On Tue, 2 May 2017, Geert Uytterhoeven wrote:
> Signed-off-by: Geert Uytterhoeven <geert@linux-m68k.org>
Applied to
git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security.git next
diff --git a/security/Kconfig b/security/Kconfig index 213df4d4f2c1527a..1bb0c5bc9caadf8c 100644 --- a/security/Kconfig +++ b/security/Kconfig @@ -134,7 +134,7 @@ config HARDENED_USERCOPY copying memory to/from the kernel (via copy_to_user() and copy_from_user() functions) by rejecting memory ranges that are larger than the specified heap object, span multiple - separately allocates pages, are not on the process stack, + separately allocated pages, are not on the process stack, or are part of the kernel text. This kills entire classes of heap overflow exploits and similar kernel memory exposures.
Signed-off-by: Geert Uytterhoeven <geert@linux-m68k.org> --- security/Kconfig | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)